About This Book

Provides detailed step-by-step instructions on the usage of many of BackTrack’s popular and not-so- popular tools

Who This Book Is For

This book is for anyone who desires to come up to speed in using BackTrack 5 or for use as a reference for seasoned penetration testers.

Table of Contents

Chapter 1: Up and Running with BackTrack

Introduction

Installing BackTrack to a hard disk drive

Installing BackTrack to a USB drive with persistent memory

Installing BackTrack on VirtualBox

Installing BackTrack using VMware Tools

Fixing the splash screen

Changing the root password

Starting network services

Setting up the wireless network

Chapter 2: Customizing BackTrack

Introduction

Preparing kernel headers

Installing Broadcom drivers

Installing and configuring ATI video card drivers

Installing and configuring NVIDIA video card drivers

Applying updates and configuring extra security tools

Setting up ProxyChains

Directory encryption

Chapter 3: Information Gathering

Introduction

Service enumeration

Determining the network range

Identifying active machines

Finding open ports

Operating system fingerprinting

Service fingerprinting

Threat assessment with Maltego

Mapping the network

Chapter 4: Vulnerability Identification

Introduction

Installing, configuring, and starting Nessus

Nessus – finding local vulnerabilities

Nessus – finding network vulnerabilities

Nessus – finding Linux-specific vulnerabilities

Nessus – finding Windows-specific vulnerabilities

Installing, configuring, and starting OpenVAS

OpenVAS – finding local vulnerabilities

OpenVAS – finding network vulnerabilities

OpenVAS – finding Linux-specific vulnerabilities

OpenVAS – finding Windows-specific vulnerabilities

Chapter 5: Exploitation

Introduction

Implementing exploits from BackTrack

Installing and configuring Metasploitable

Mastering Armitage – the graphical management tool for Metasploit

Mastering the Metasploit Console (MSFCONSOLE)

Mastering the Metasploit CLI (MSFCLI)

Mastering Meterpreter

Metasploitable MySQL

Metasploitable PostgreSQL

Metasploitable Tomcat

Metasploitable PDF

Implementing the browser_autopwn module

Chapter 6: Privilege Escalation

Introduction

Using impersonation tokens

Local privilege escalation attack

Mastering the Social-Engineer Toolkit (SET)

Collecting victims' data

Cleaning up the tracks

Creating a persistent backdoor

Man-in-the-middle attack (MITM)

Chapter 7: Wireless Network Analysis

Introduction

Cracking a WEP wireless network

Cracking a WPA/WPA2 wireless network

Automating wireless network cracking

Accessing clients using a fake AP

URL traffic manipulation

Port redirection

Sniffing network traffic

Accessing an e-mail by stealing cookies

Chapter 8: Voice over IP (VoIP)

Introduction

Using Svmap

Finding valid extensions

Monitoring, capturing, and eavesdropping on VoIP traffic

Using VoIPong

Mastering UCSniff

Mastering Xplico

Capturing SIP authentication

Mastering VoIP Hopper

Causing a denial of service

Attacking VoIP using Metasploit

Sniffing DECT phones

Chapter 9: Password Cracking

Introduction

Online password attacks

Cracking HTTP passwords

Gaining router access

Password profiling

Cracking a Windows password using John the Ripper

Using dictionary attacks

Using rainbow tables

Using NVIDIA Compute Unified Device Architecture (CUDA)

Using ATI Stream

Physical access attacks

Chapter 10: BackTrack Forensics

Introduction

Intrusion detection and log analysis

Recursive directory encryption/decryption

Scanning for signs of rootkits

Recovering data from a problematic source

Retrieving a Windows password

Resetting a Windows password

Looking at the Windows registry entries

What You Will Learn

Install and set up BackTrack 5 on multiple platforms

Customize BackTrack to fit your individual needs

Exploit vulnerabilities found with Metasploit

Locate vulnerabilities Nessus and OpenVAS

Provide several solutions to escalate privileges on a compromised machine

Learn how to use BackTrack in all phases of a penetration test

Crack WEP/WPA/WPA2 Encryption

Learn how to monitor and eavesdrop on VOIP networks

In Detail

BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. BackTrack is a distribution based on the Debian GNU/Linux distribution aimed at digital forensics and penetration testing use. It is named after backtracking, a search algorithm.

The book begins by covering the installation of BackTrack 5 and setting up a virtual environment to perform your tests.

We then dip into recipes involving the basic principles of a penetration test such as information gathering, vulnerability identification, and exploitation. You will further learn about privilege escalation, radio network analysis, Voice over IP, Password cracking, and BackTrack forensics.

"BackTrack 5 Cookbook" will serve as an excellent source of information for the security professional and novice alike.

Authors

Willie L. Pritchett

Willie L. Pritchett has a Master's in Business Administration. He is a seasoned developer and security enthusiast who has over 20 years of experience in the IT field. He is currently the Chief Executive at Mega Input Data Services, Inc., a full service database management firm specializing in secure, data-driven, application development, and staffing services. He has worked with state and local government agencies as well as helping many small businesses reach their goals through technology. Willie has several industry certifications and currently trains students on various topics including ethical hacking and penetration testing.

David De Smet

David De Smet has worked in the software industry since 2007 and is the founder and CEO of iSoftDev Co., where he is responsible for many varying tasks, including but not limited to consultant, customer requirements specification analysis, software design, software implementation, software testing, software maintenance, database development, and web design. He is so passionate about what he does that he spends inordinate amounts of time in the software development area. He also has a keen interest in the hacking and network security field and provides network security assessments to several companies.

Alerts & Offers

Series & Level

We understand your time is important. Uniquely amongst the major publishers, we seek to develop and publish the broadest range of learning and information products on each technology. Every Packt product delivers a specific learning pathway, broadly defined by the Series type. This structured approach enables you to select the pathway which best suits your knowledge level, learning style and task objectives.

Learning

As a new user, these step-by-step tutorial guides will give you all the practical skills necessary to become competent and efficient.

Beginner's Guide

Friendly, informal tutorials that provide a practical introduction using examples, activities, and challenges.

Essentials

Fast paced, concentrated introductions showing the quickest way to put the tool to work in the real world.

Cookbook

A collection of practical self-contained recipes that all users of the technology will find useful for building more powerful and reliable systems.

Blueprints

Guides you through the most common types of project you'll encounter, giving you end-to-end guidance on how to build your specific solution quickly and reliably.

Mastering

Take your skills to the next level with advanced tutorials that will give you confidence to master the tool's most powerful features.

Starting

Accessible to readers adopting the topic, these titles get you into the tool or technology so that you can become an effective user.

Progressing

Building on core skills you already have, these titles share solutions and expertise so you become a highly productive power user.